1. Anderson, R., Kuhn, M.: Tamper Resistance - a Cautionary Note. In: The proceedings of the USENIX Workshop on Electronic Commerce, Oakland, CA, USA, November 1996, pp. 1–11 (1996)
2. Lecture Notes in Computer Science;R. Anderson,1998
3. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer’s Apprentice Guide to Fault Attacks, IACR e-print archive 2004/100 (2004), http://eprint.iacr.org
4. Barreto, P., Rijmen, V.: The KHAZAD Legacy-Level Block Cipher, Submission to NESSIE project, Available from: http://www.cosic.esat.kuleuven.ac.be/nessie/
5. Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error Analysis And Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. IEEE Transactions on Computers 52(4), 492–505 (2003)